whoami

Learning, Building,
Deploying

Systems engineering enthusiast and homelab practitioner passionate about infrastructure, automation, and practical technical projects. Welcome to my digital workshop.

🔍
Latest Security Research • Feb 25, 2026

SEO Poisoning & Domain Hijacking via Compromised .EDU Infrastructure

Discovered and documented a live multistage attack exploiting Central Texas College's domain authority. Full technical analysis includes attack chain breakdown, MITRE ATT&CK mapping, and IOCs.

About Me

I'm an aspiring cybersecurity professional building practical experience through applied homelab projects and structured training. My lab environment serves as both a learning platform and testing ground where I develop realistic security skills.

From penetration testing and SIEM deployment to Active Directory security and network monitoring, I'm working through the foundational skills needed for a career in cybersecurity. Each project pushes me to understand attack vectors, defensive techniques, and the tools security professionals use daily.

Currently completing the RapidAscent cybersecurity program and pursuing industry certifications while documenting my learning journey and building a portfolio of practical security projects.

Focus Areas
Security Operations & Analysis
Experience Level
Early Career
Current Status
Always Learning

Education & Certifications

Continuously expanding my cybersecurity knowledge through structured training programs and industry recognized certifications.

In Progress

Completing comprehensive DoD approved cybersecurity training program with practical job simulations and realistic scenarios. Working through gamified labs that mirror actual Security Operations Center (SOC) environments.

MITRE ATT&CK Framework OSINT Techniques Docker Containerization Phishing Analysis Risk Assessment Threat Intelligence

Key focus areas include threat intelligence analysis, open-source intelligence gathering, container security, social engineering defense, and enterprise risk management.

Pursuing
ISC2 CC

Certified in Cybersecurity, a foundation level security certification covering security principles, network security, and risk management.

Pursuing
CompTIA Security+

Industry standard security certification validating baseline cybersecurity skills and knowledge across various domains.

TryHackMe | Jun 2025 to Present

Completed 100+ hours of practical cybersecurity training through structured, applied labs covering penetration testing, incident response, SOC operations, and cloud security.

  • Network & Web Application Penetration Testing with 90% remediation success rate
  • Analyzed 25+ simulated attacks examining 5,000+ logs, SIEM alerts, and PCAPs
  • Built Splunk dashboards reducing false positives by 33% and boosting detection speed by 40%
  • Led 15+ red/blue team scenarios including privilege escalation and lateral movement
  • Hardened AWS environments with IAM policies and Zero Trust architecture
  • Developed Python and Bash automation scripts improving response time by 60%
  • Digital forensics and malware analysis using MITRE ATT&CK framework

Professional Experience

Cybersecurity Analyst Apprenticeship

RapidAscent
Jan 2026 to Present
Remote
  • 800+ Hours of Intensive Training: Completed fulltime, immersive cybersecurity program covering SOC operations, threat intelligence, penetration testing, and cloud security across aerospace, finance, energy, and defense sectors
  • Governance, Risk & Compliance (GRC): Created and enforced security policies, risk assessments, and incident response protocols, ensuring alignment with NIST 800-53, HIPAA, PCI-DSS, FedRAMP, and FISMA standards
  • Network & Systems Security: Fortified Windows and Linux systems by securing Active Directory environments, firewalls, and Zero Trust frameworks, resulting in 40% reduction in attack surface during enterprise simulations
  • Threat Hunting & Incident Response: Led threat investigations using MITRE ATT&CK, PCAPs, and SIEM correlation, reducing Mean Time to Detect (MTTD) by 40% and improving initial response playbook execution
  • Penetration Testing & Vulnerability Management: Executed vulnerability scans with Nmap and Nessus across diverse environments, identifying critical CVEs and enabling 90% remediation success rate
  • Secure Coding & Automation: Developed 10+ custom Python and Bash scripts to streamline log analysis, automate incident workflows, and harden configurations, improving response time by 60%
  • SOC Engineering & Threat Response: Monitored, triaged, and responded to 5,000+ simulated threat events in live SOC cyber range, reducing threat dwell time to under 3 hours
  • Red & Blue Team Operations: Simulated realistic cyber attacks including ransomware, phishing, and privilege escalation, reducing average threat dwell time from 24+ hours to under 3 hours

CTR (Cryptologic Technician)

U.S. Navy
5 Deployments (7th Fleet)
Sasebo, Japan; San Diego, CA; Pensacola, FL
  • Performed acquisition, analysis, and reporting of advanced communications signals at the intermediate level
  • Documented and processed classified materials, ensuring stringent compliance with security protocols and maintaining operational security
  • Maintained 100% accountability for all assigned multimillion dollar equipment throughout multiple deployments
  • Planned and briefed personnel on mission objectives, enhancing operational efficiency and team coordination
  • Coordinated and led training programs in preparation for air operations, fostering team readiness and skill development

In Port Security Reaction Force Team Member

U.S. Navy, USS AMERICA
April 2023 to April 2024
Security Operations
  • Completed multiple certification drills to improve antiterrorism readiness shipwide
  • Stood hundreds of hours of vigilant watch protecting vital national security assets and critical national infrastructure
  • Maintained strict security protocols and access control procedures for sensitive military installations
  • Conducted threat assessments and responded to security incidents with rapid decision making under pressure

Cybersecurity Homelab

Built an enterprise grade virtualized security lab for practical experience with offensive security, defensive monitoring, and network architecture. Running on an Acer Predator laptop with nested virtualization.

🔍

Security Research & Analysis

Discovered and documented a live SEO poisoning attack exploiting compromised .EDU infrastructure. Traced a multistage attack chain involving domain hijacking, cloaking techniques, and browser based social engineering. Published comprehensive field report detailing the attack methodology, technical analysis, and remediation recommendations.

Threat Analysis SEO Poisoning OSINT Incident Documentation

Virtualization Platform

Set up Proxmox VE as a nested hypervisor inside VMware Workstation. Configured static networking, enabled nested virtualization in BIOS, and optimized resource allocation across multiple security VMs. Managing everything through the web interface on a custom network.

Proxmox VE 8.x VMware KVM/QEMU
🎯

Offensive Security Lab

Deployed Kali Linux with 300+ pre-installed penetration testing tools. Practicing network scanning with Nmap, web app testing with Burp Suite, and exploitation with Metasploit. Working through VulnHub boxes and documenting findings in professional reports.

Kali Linux 2025.4 Metasploit Burp Suite Nmap
🛡️

SIEM & Monitoring

Built Ubuntu Server VM as the foundation for Wazuh SIEM deployment. Configured for log aggregation, security monitoring, and alert creation. Learning to detect attacks in real-time and practice incident response workflows.

Ubuntu Server 22.04 Wazuh SIEM Log Analysis
🌐

Network Architecture

Designed and implemented segmented virtual networks with NAT and bridge configurations. Set up proper routing and DNS resolution across the lab. Learning network security fundamentals and how traffic flows between isolated environments.

Virtual Networking NAT/Bridging Network Segmentation
🏢

Active Directory Lab (In Progress)

Currently deploying Windows Server 2022 as a Domain Controller with Windows 10 clients. Planning to practice Active Directory attacks like Kerberoasting and Bloodhound enumeration, while also implementing defensive techniques and monitoring everything through the SIEM.

Windows Server 2022 Active Directory Bloodhound

Get In Touch

Interested in connecting? Feel free to reach out through any of these channels.